Information Communication Technology
Permanent URI for this community
Browse
Browsing Information Communication Technology by Author "Adetunji, Temitope Oluwafunmilayo"
Now showing 1 - 1 of 1
Results Per Page
Sort Options
Item Facial and keystroke biometric recognition for computer based assessments(Vaal University of Technology, 2019-12) Adetunji, Temitope Oluwafunmilayo; Appiah, Martin, Dr.; Zuva, Tranos, Prof.Computer based assessments have become one of the largest growing sectors in both nonacademic and academic establishments. Successful computer based assessments require security against impersonation and fraud and many researchers have proposed the use of Biometric technologies to overcome this issue. Biometric technologies are defined as a computerised method of authenticating an individual (character) based on behavioural and physiological characteristic features. Basic biometric based computer based assessment systems are prone to security threats in the form of fraud and impersonations. In a bid to combat these security problems, keystroke dynamic technique and facial biometric recognition was introduced into the computer based assessment biometric system so as to enhance the authentication ability of the computer based assessment system. The keystroke dynamic technique was measured using latency and pressure while the facial biometrics was measured using principal component analysis (PCA). Experimental performance was carried out quantitatively using MATLAB for simulation and Excel application package for data analysis. System performance was measured using the following evaluation schemes: False Acceptance Rate (FAR), False Rejection Rate (FRR), Equal Error Rate (EER) and Accuracy (AC), for a comparison between the biometric computer based assessment system with and without the keystroke and face recognition alongside other biometric computer based assessment techniques proposed in the literature. Successful implementation of the proposed technique would improve computer based assessment’s reliability, efficiency and effectiveness and if deployed into the society would improve authentication and security whilst reducing fraud and impersonation in our society.